Friday, 21 December 2012

If You are Regular or often User of Computer you will have Heard or see about Resolution about Desktop Screen or laptop Screen. This screen's Resolution's Real meaning is as below.

Resolution Size and Full-Form

VGA- Video Graphic Array (640 X 480)

SVGA - Super Video Graphic Array (800 X 600)

XGA - eXtended Graphic Array (1024 X 768)

SXGA - Super eXtended Graphic Array (1280 X 1024)

UXGA - Ultra eXtended Graphic Array (1600 X 1200)

Now after reading the above Secrets you can choose your own resolution without any Experts help.

hackhours.blogspot.com  (Rahul Patil)

Facts About Bill Gates

1. Bill Gates earns US$250 every SECOND, that's about US$20 Million a DAY and US$7.8 Billion a YEAR!

2. If he drops a thousand dollar, he won't even bother to pick it up bcoz the 4 seconds he picks it, he would've already earned it back.

3. The US national debt is about 5.62 trillion, if Bill Gates were to pay the debt by himself; he will finish it in less then 10 years.

4. He can donate US$15 to everyone on earth but still be left with US$5 Million for his pocket money.

5. Michael Jordan is the highest paid athlete in US. If he doesn't drink and eat, and keeps up his annual income i.e. US$30 Million, he'll have to wait for 277 years to become as rich as Bill Gates is now.

6. If Bill Gates was a country, he would be the 37th richest country on earth.

7. If you change all of Bill Gate's money to US$1 notes, you can make a road from earth to moon, 14 times back and forth. But you have to make that road non-stop for 1,400 years, and use a total of 713 BOEING 747 planes to transport all the money.

8. Bill Gates is 40 this year. If we assume that he will live for another 35 years, he has to spend US$6.78 Million per day to finish all his money before he can go to heaven.


Last but not the least: If Microsoft Windows' users can claim US$1 for every time their computers hang because of Microsoft Windows, Bill Gates will be bankrupt in 3 years !!!!!!! !!!!

Hey Guys.. This is Rahul Patil... and I am back with my New trick.. Create a Send to Menu Shortcut..
Now send any file to your Folder directly via Send to Menu...

Follow the Steps...

First you’ll need access to hidden files. So change your view settings to make all hidden files visible.


In My Computer..
Tools -> folder options -> view (tab) and select the show hidden files and folders.

go to parent drive:/documents and settings/(user name)/send to

Open up my computer and locate your most used folders.

Create a shortcut of the most used folders in SEND TO FOLDER. (You can do this in a number of ways.)

Right click -> send to desktop(create shortcut) and move the shortcut from the desktop to the SEND TO FOLDER

Copy the most used folder and go to SEND TO FOLDER and right click -> paste shortcut.

Also remember to rename the shortcuts to send to videos or send to photos. You don’t need confusion when You use the same later.

DONE.

Malware, short for malicious software, is software designed to secretly access a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses. [Wikipedia]

With the increase in malware "programmers", numerous malwares/spywares are releasing everyday.

Here are some ways to stay safe from most malwares in Windows:

1. OS Installation Directory

Most of them are skids, so they hard-code location names in their apps, instead of getting the System Directory. As you know the default installation of Windows XP, Vista, 7 is C:\Windows. When you are installing an OS, you are asked for the installation location, even Directory name. Just change C:\Windows to something like E:\OSdir, etc. and you should be immune from skid malwares.

Note: Some softwares may stop working this way, since it can be possible that they are using the same idea. Just find an alternative for them.

2. Show Hidden Folders, and System Files

It is really easy to make any file System/Hidden in most programming languages, so most malwares hide their stub using these attributes. It becomes real easy to find them after you unhide them.

3. Use BinText on suspicious apps

You have found a suspiciously hidden App? Open it in BinText, it will display all Text in the app. Most programmers don't hide Text, although it can be done by obfuscating. But there is still a very good chance you can find suspicious information in an app. If you find text like ", , etc" then the app is a malware/spyware.

Download BinText now from Official Site

4. Process in Task Manager

Most of the Malwares cannot hide their task from TaskManager. All they do is Disable Task Manager by creating a Key in Registry. Just Download another Task Manager, there are lots, or make one yourself (Google for that), and you can End the Process of the suspicious app.

These are some basic tips that can help you to stay safe from most malwares.

My friend recently bought a Toshiba laptop, but it was stolen within a couple days. The good thing is that i had installed a tracing software on his laptop the very same day he bought it, and he had no troubles finding it. This can happen to anyone which is using laptop, so having a tracing software installed on your laptop is not a bad idea.

Here i am showing you a free laptop tracing software called Prey.

Prey lets you keep track of your phone or laptop at all times, and will help you find it if it ever gets lost or stolen. It's lightweight, open source software, and free for anyone to use. And it just works.
 How it Works?

Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic.

This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it.

Notice: This file is Trojan as detected by some antivirus, but the thing is every such files are called trojan, as the process is to Track your system and view your systems reports. But be secure, this file is not harmful for your system or for your personal information. This software is made By PRey Project Company, and they take responsibility of it.

How to Download and Install Prey?

1. First of all download Prey project file from here.

2. After Downloading, Install the File and than

- They will ask for either standalone and +control panel.
- Go for +control panel, and than Click For New User.
- Give Your Name, Your Email and select Password to login the site.

E.g, Name :- Rahul Patil
Email:-rhlptl1111@gmail.com
Password:-123456 (any Password that you choose) for Entering the site, and than press ok.

- You will get Email from prey project, just activate your account there, and click your device and do the following settings:
 If you "on" any of the above settings than be sure to remember password of "lock pass". It will show as the tym you make it on. Just below the lock it will be written pass, and when alert is on the message will display whenever you login, "this laptop is stolen ...."-lol

So these were all steps now you can install and get secure. Now if its get stolen than you can track back

Remember:
This still has demerit E.g, If theif formats your system completly than its no way possible to get back than to ask for police, and they don't track laptop normally, until the stolen system is related with some serious case.

How to Detect Fake Mails:

1. Lets get back to the example I illustrated in my article Fake Mailer. I had used "support@gmail.com" as the sender email address. No doubt, this was fake and the receiver will get the fake email sent by me.

2. Suppose you are the receiver. Now, I will tell you how to recognize this mail as fake. Open the email and hit on "Show Details".

3. Something you must know:
 Whenever Google sends you any email, the email details will contain fields like:

- Mailed by
- Signed by (optional)


Also, most of the times, "Mailed by" field will have value:

*.bounces.google.com or
*.google.com


depending on the type of your mail. This is true for every genuine email from every mail provider.

4. But, these two fields will not be present in the details of Fake Mail. Also, if the mail details contain these fields, the value of these fields will not be *.google.com


Fake Mail without "Mailed by" field:


Fake Mail with "Mailed by" field.
 As you can see, the "mailed by" field shows the hosting server's name and not the Google server. This means, this server is used to send you the fake email and most probably, the fake mailer is hosted on the same server.


You can also check out the header field to detect fake mails. Follow the steps:

- Open the mail. Hit on down arrow next to "Reply" and click on "Show Original".

- Now, check out "Received" fields. This field will show you the name of server from which the mail is sent. As you can see, we have used "emkei.cz" as our fake mailer. So, it has appeared in "Received" field.

More Tips:

- Fake Mail usually have attractive titles.
- Such mails address receiver as "Dear Customer" or such and do not use your real name.
- Never click on any link in emails. Instead, open such links manually in new tab









we all know that a slow internet connection really costs time and makes feel annoying . many friends ask me the ways to increase their internet speed.however . it's possible to do to some extent and make your internet
much better then it was in the past.

There are Two tricks that will help you to increase your internet speed..


First Method- Speed Up Your Net Speed By 20%


1. First you go to start button

2. Go To Run

3. Type gpedit.msc And Then Hit Enter.

4.Then Expand Adminsitrative Templates.

5.Then Network

6.Then QoS Packet Scheduler.

Now A New List Appear . Click On Limit Reservable Bandwidth.
Just Disable it.

Now You Click On Apply .

That's It Now You Are Done !! :)

Now Just Restart Your Computer . And I hope You will Get change in Your Speed

Some Basic Tricks From My Side-
1. Use IDM To Boost Your Downloading Speed.

2. Use A Good Anti-virus in Your Computer.
3. Remove Unwanted Add-ons, Software,Unwanted Files Form Your Computer.

4.Update Your Drivers Periodically.

5.Keep A Good Maintennance Of Your Computer.


So I Hope this tricks was useful for you !!

Thursday, 20 December 2012

BATTERY CHARGING TRICK

Now reacharge your mobile with a leaf atteach with leaf of your mobile battery few mintes your mobile battery will be charged
EnJoY!!!
TIP:-TOUCH THE LEAF ONLY IN THE -&+ PANEL AS IN THE PICTURE